VulDB Powershell scripts to fetch data via API
-
Updated
Feb 24, 2020 - PowerShell
VulDB Powershell scripts to fetch data via API
Source Code Analysis Utility
Simple application to test vulnerabilities proposed in my Final Paper, https://drive.ifsp.edu.br/s/050e337ca0d9f162cbf009e32bb74acd#pdfviewer.
Studying Vulnerability of Package Dependency Networks
This article aims to demystify SQL Injection, explaining what it is, how it operates, its purposes in the cybersecurity landscape, and mentioning tools that can be used to conduct such attacks.
NBCU command line implementation of python-portscan
An Audit and Analysis of Solidity Smart Contracts.
Yet Another Web Security Scanner | A Web Application Security Scanner Written in Python.
The Common Vulnerabilities Exposures (CVE) Database
Mail Message-ID Fingerprinting
Open source patch/vulnerability manager for third party libraries
[CYBERSECURITY PROJECT] As an IT student and a cybersecurity thesis assistant in the French laboratory IRISA, I searched how to extract the vulnerability assets from CAPEC. I used R language to do XML extraction and processes of VA extraction. A BASH application has been written and allows to use this tool thanks a command prompt (Linux Distribu…
High-risk CVEs that may require verification and impact analysis.
Mail Message-ID Fingerprinting
Exploit code for Vulnerable IoT Demonstrator
CVE handling by VulDB CNA Team (no external commits accepted). This repository is retired as all CVE exchanges happen via CVE CNA API.
VulDB Javascript scripts to fetch data via API
Offline WordPress plugin version acquisition scanner and online version vulnerability identification. Scan an offline or online WordPress install for vulnerable plugins as long as it is run from Windows computer.
CERT/CC's fork of Metasploit Framework in which we are tagging commits that include vulnerability IDs. The first commit for an ID we recognize gets the tag for that ID. Aside from adding git tags, we do not otherwise modify the code. Updates hourly.
Add a description, image, and links to the vulnerability-identification topic page so that developers can more easily learn about it.
To associate your repository with the vulnerability-identification topic, visit your repo's landing page and select "manage topics."